Browse by

Publications

News | April 1, 2009

Cyberpower and National Security

By Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz

Cyberpower and National Security frames the key issues concerned and identifies the important questions involved in building the human capacity to address cyber issues, balancing civil liberties with national security considerations, and developing the international partnerships needed to address cyber challenges. With more than two dozen contributors, Cyberpower and National Security covers it all.

Preface
Introduction

Part I. Foundation and Overview
Cyberpower and National Security: Policy Recommendations for a Strategic Framework
– Franklin D. Kramer

From Cyberspace to Cyberpower: Defining the Problem
– Daniel T. Kuehl

Toward a Preliminary Theory of Cyberpower
– Stuart H. Starr

Part II. Cyberspace
A Graphical Introduction to the Structural Elements of Cyberspace
– Elihu Zimet and Edward Skoudis

Cyberspace and Infrastructure
– William D. O’Neil

Evolutionary Trends in Cyberspace
– Edward Skoudis

Information Security Issues in Cyberspace
– Edward Skoudis

The Future of the Internet and Cyberpower
– Marjory S. Blumenthal and David D. Clark

Information Technology and the Biotech Revolution
– Edward Skoudis

Part III. Cyberpower: Military Use and Deterrence
An Environmental Approach to Understanding Cyberpower
– Gregory J. Rattray

Military Cyberpower
– Martin C. Libicki

Military Service Overview
– Elihu Zimet and Charles L. Barry

Deterrence of Cyber Attacks
– Richard L. Kugler

Part IV. Cyberpower: Information
Cyber Influence and International Security
– Franklin D. Kramer and Larry K. Wentz

Tactical Influence Operations
– Stuart H. Starr

I-Power: The Information Revolution and Stability Operations
– Franklin D. Kramer, Larry K. Wentz, and Stuart H. Starr

Facilitating Stability Operations with Cyberpower - LINK BROKEN
– Gerard J. Christman

Part V. Cyberpower: Strategic Problems
Cyber Crime
– Clay Wilson

Cyber Terrorism: Menace or Myth?
– Irving Lachow

Nation-state Cyber Strategies: Examples from China and Russia
– Timothy L. Thomas

Part VI. Institutional Factors
Internet Governance
– Harold Kwalwasser

International Law and Information Operations
– Thomas C. Wingfield

Cyberpower and Critical Infrastructure Protection: A Critical Assessment of Federal Efforts
– John A. McCarthy with Chris Burrow, Maeve Dion, and Olivia Pacheco

Cyberpower from the Presidential Perspective
– Leon Fuerth

About the Contributors